Posts: 5
Threads: 5
Joined: Apr 2026
https://hightechcampus.com/storage/903/A...0316-2.jpg
Hi BreachForums Community,
Today i am leaking ASML.COM ~154 DB's.
ASML is a dutch multinational company and the world's leader supplier of photolitography systems and crucial machines
that chipmakers use.
The files will be in .SQL extensions you need to convert it with a tool to .csv or plaintext.
The compromissed data are:
- Disk Encryption keys
- users
- software, and etc.
- devices
Sample:
DROP TABLE IF EXISTS `host_disk_encryption_keys`;
/*!40101 SET @saved_cs_client = @@character_set_client */;
/*!50503 SET character_set_client = utf8mb4 */;
CREATE TABLE `host_disk_encryption_keys` (
`host_id` int unsigned NOT NULL,
`base64_encrypted` text COLLATE utf8mb4_unicode_ci NOT NULL,
`base64_encrypted_salt` varchar(255) CHARACTER SET utf8mb4 COLLATE utf8mb4_unicode_ci NOT NULL DEFAULT '',
`key_slot` tinyint unsigned DEFAULT NULL,
`decryptable` tinyint(1) DEFAULT NULL,
`created_at` timestamp(6) NOT NULL DEFAULT CURRENT_TIMESTAMP(6),
`updated_at` timestamp(6) NULL DEFAULT CURRENT_TIMESTAMP(6) ON UPDATE CURRENT_TIMESTAMP(6),
`reset_requested` tinyint(1) NOT NULL DEFAULT '0',
`client_error` varchar(255) CHARACTER SET utf8mb4 COLLATE utf8mb4_unicode_ci NOT NULL DEFAULT '',
PRIMARY KEY (`host_id`),
KEY `idx_host_disk_encryption_keys_decryptable` (`decryptable`)
) ENGINE=InnoDB DEFAULT CHARSET=utf8mb4 COLLATE=utf8mb4_unicode_ci;
/*!40101 SET character_set_client = @saved_cs_client */;
Download:
This forum account is currently banned. Ban Length: Permanent (N/A Remaining) Ban Reason: Contact Administration.
Posts: 62
Threads: 7
Joined: Jan 2025
Posts: 49
Threads: 1
Joined: Jul 2024
Posts: 71
Threads: 2
Joined: Mar 2024
Did anyone download it? Is that true?
Posts: 118
Threads: 7
Joined: Jan 2025
(Jan 06, 2026, 10:02 PM)1011 Wrote: https://hightechcampus.com/storage/903/A...0316-2.jpg
Hi BreachForums Community,
Today i am leaking ASML.COM ~154 DB's.
ASML is a dutch multinational company and the world's leader supplier of photolitography systems and crucial machines
that chipmakers use.
The files will be in .SQL extensions you need to convert it with a tool to .csv or plaintext.
The compromissed data are:
- Disk Encryption keys
- users
- software, and etc.
- devices
Sample:
DROP TABLE IF EXISTS `host_disk_encryption_keys`;
/*!40101 SET @saved_cs_client = @@character_set_client */;
/*!50503 SET character_set_client = utf8mb4 */;
CREATE TABLE `host_disk_encryption_keys` (
`host_id` int unsigned NOT NULL,
`base64_encrypted` text COLLATE utf8mb4_unicode_ci NOT NULL,
`base64_encrypted_salt` varchar(255) CHARACTER SET utf8mb4 COLLATE utf8mb4_unicode_ci NOT NULL DEFAULT '',
`key_slot` tinyint unsigned DEFAULT NULL,
`decryptable` tinyint(1) DEFAULT NULL,
`created_at` timestamp(6) NOT NULL DEFAULT CURRENT_TIMESTAMP(6),
`updated_at` timestamp(6) NULL DEFAULT CURRENT_TIMESTAMP(6) ON UPDATE CURRENT_TIMESTAMP(6),
`reset_requested` tinyint(1) NOT NULL DEFAULT '0',
`client_error` varchar(255) CHARACTER SET utf8mb4 COLLATE utf8mb4_unicode_ci NOT NULL DEFAULT '',
PRIMARY KEY (`host_id`),
KEY `idx_host_disk_encryption_keys_decryptable` (`decryptable`)
) ENGINE=InnoDB DEFAULT CHARSET=utf8mb4 COLLATE=utf8mb4_unicode_ci;
/*!40101 SET character_set_client = @saved_cs_client */;
Download:
thanks for the leak
Posts: 290
Threads: 13
Joined: Sep 2023
Look bro, if you're going to share something like this, you should include more examples, otherwise it's not convincing
Posts: 1
Threads: 0
Joined: Apr 2026
based on the sample I doubt that this is legit, I guess we'll wait and see This forum account is currently banned. Ban Length: Permanent (N/A Remaining) Ban Reason: Contact Administration.
Posts: 1
Threads: 0
Joined: Aug 2024
points are required to download this, which I don’t have.
taking a look at the sample only, I’m honestly not convinced it’s legit.
from past leaks, the formatting and field structure usually look different.
xact details like timestamps and consistent IDs seem to be missing here.
question is, can anyone who downloaded it confirm authenticity?
Posts: 15
Threads: 0
Joined: Jul 2023
Jan 08, 2026, 08:12 AM
(This post was last modified: Jan 08, 2026, 08:16 AM by song19891121.)
Did anyone download it?
Thank you for sharing this information with the community
Posts: 58
Threads: 1
Joined: Apr 2026
Thanks for this
quote="1011" pid='1242734' dateline='1767736979']
https://hightechcampus.com/storage/903/A...0316-2.jpg
Hi BreachForums Community,
Today i am leaking ASML.COM ~154 DB's.
ASML is a dutch multinational company and the world's leader supplier of photolitography systems and crucial machines
that chipmakers use.
The files will be in .SQL extensions you need to convert it with a tool to .csv or plaintext.
The compromissed data are:
- Disk Encryption keys
- users
- software, and etc.
- devices
Sample:
DROP TABLE IF EXISTS `host_disk_encryption_keys`;
/*!40101 SET @saved_cs_client = @@character_set_client */;
/*!50503 SET character_set_client = utf8mb4 */;
CREATE TABLE `host_disk_encryption_keys` (
`host_id` int unsigned NOT NULL,
`base64_encrypted` text COLLATE utf8mb4_unicode_ci NOT NULL,
`base64_encrypted_salt` varchar(255) CHARACTER SET utf8mb4 COLLATE utf8mb4_unicode_ci NOT NULL DEFAULT '',
`key_slot` tinyint unsigned DEFAULT NULL,
`decryptable` tinyint(1) DEFAULT NULL,
`created_at` timestamp(6) NOT NULL DEFAULT CURRENT_TIMESTAMP(6),
`updated_at` timestamp(6) NULL DEFAULT CURRENT_TIMESTAMP(6) ON UPDATE CURRENT_TIMESTAMP(6),
`reset_requested` tinyint(1) NOT NULL DEFAULT '0',
`client_error` varchar(255) CHARACTER SET utf8mb4 COLLATE utf8mb4_unicode_ci NOT NULL DEFAULT '',
PRIMARY KEY (`host_id`),
KEY `idx_host_disk_encryption_keys_decryptable` (`decryptable`)
) ENGINE=InnoDB DEFAULT CHARSET=utf8mb4 COLLATE=utf8mb4_unicode_ci;
/*!40101 SET character_set_client = @saved_cs_client */;
Download:
[/quote]
Thanks for this
quote="1011" pid='1242734' dateline='1767736979']
https://hightechcampus.com/storage/903/A...0316-2.jpg
Hi BreachForums Community,
Today i am leaking ASML.COM ~154 DB's.
ASML is a dutch multinational company and the world's leader supplier of photolitography systems and crucial machines
that chipmakers use.
The files will be in .SQL extensions you need to convert it with a tool to .csv or plaintext.
The compromissed data are:
- Disk Encryption keys
- users
- software, and etc.
- devices
Sample:
DROP TABLE IF EXISTS `host_disk_encryption_keys`;
/*!40101 SET @saved_cs_client = @@character_set_client */;
/*!50503 SET character_set_client = utf8mb4 */;
CREATE TABLE `host_disk_encryption_keys` (
`host_id` int unsigned NOT NULL,
`base64_encrypted` text COLLATE utf8mb4_unicode_ci NOT NULL,
`base64_encrypted_salt` varchar(255) CHARACTER SET utf8mb4 COLLATE utf8mb4_unicode_ci NOT NULL DEFAULT '',
`key_slot` tinyint unsigned DEFAULT NULL,
`decryptable` tinyint(1) DEFAULT NULL,
`created_at` timestamp(6) NOT NULL DEFAULT CURRENT_TIMESTAMP(6),
`updated_at` timestamp(6) NULL DEFAULT CURRENT_TIMESTAMP(6) ON UPDATE CURRENT_TIMESTAMP(6),
`reset_requested` tinyint(1) NOT NULL DEFAULT '0',
`client_error` varchar(255) CHARACTER SET utf8mb4 COLLATE utf8mb4_unicode_ci NOT NULL DEFAULT '',
PRIMARY KEY (`host_id`),
KEY `idx_host_disk_encryption_keys_decryptable` (`decryptable`)
) ENGINE=InnoDB DEFAULT CHARSET=utf8mb4 COLLATE=utf8mb4_unicode_ci;
/*!40101 SET character_set_client = @saved_cs_client */;
Download:
[/quote] This forum account is currently banned. Ban Length: Permanent (N/A Remaining) Ban Reason: Contact Administration.
|